Prerequisites: Compile the Linux script
Countermeasures: Host-based firewalls
Description: The passifist application attempts to identify targets within a Local Area Network (LAN) by listening in passive mode on the LAN and from the results of the information identifies the target’s IP address, MAC address, hostname, and probable operating system used.
Procedure:
Step 1: Download passifist file type tar –zxvf passifist_src_1.0.6.tgz.
Step 2: The contents will be extracted into a new directory named passifist. Change to the new directory by typing cd passifist and pressing Enter. From the passifist directory type ./configure and press Enter.
Type in make and press Enter.
Initiate the passive discovery with the following syntax:
./passifist –I eth0 –U "provider=TXT:
filename=foobar.txt"
The results in this example identified seven targets on the LAN. From the options entered when the passifist application was started, the results were saved in a text file named foobar.txt within the directory passifist resides in.
The foobar.txt file the results identified as shon below
*Note: Remember that the objective is to gather as much information as possible about the target. All of this information is useful to an attacker as it identifies what targets are available and helps guide the attacker in the appropriate direction.
0 Visitor Reactions & Comments: